Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 23:01
Behavioral task
behavioral1
Sample
c1d3f7d93e66d73dff1e34dec1f9176d.exe
Resource
win7-20240221-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
c1d3f7d93e66d73dff1e34dec1f9176d.exe
Resource
win10v2004-20240226-en
3 signatures
150 seconds
General
-
Target
c1d3f7d93e66d73dff1e34dec1f9176d.exe
-
Size
23KB
-
MD5
c1d3f7d93e66d73dff1e34dec1f9176d
-
SHA1
31228291a8ac1284a2fd536ad5960a5becd4f3dc
-
SHA256
875bde9d9934f95ce52ae929d91a9f464fcc5ae78f9d90ac5a5e7b8d1344a112
-
SHA512
a81ede6df8b41232812d9845d2ac1114b76d29c662005fdb8dd4028239a021b0b8351783a2d19d6bb9fb4b307c436ba115332d91ba3855d433508ffee2e86d6d
-
SSDEEP
384:d71VRtTh3IVs+XLnVy9P75NeleqKaOHNI7MLKPrY9tzcgNRCui+A010w1e6wU8m5:HPtTUXzVy9TfqKaWNIY9/Nvi30ywkU84
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3160-0-0x0000000000010000-0x0000000000024000-memory.dmp upx behavioral2/memory/3160-1-0x0000000000010000-0x0000000000024000-memory.dmp upx -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.add-hhh.info/" c1d3f7d93e66d73dff1e34dec1f9176d.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 656 Process not Found